A computer network having a requesting node and a providing node permits data transfer therebetween when permitted by an authorizing node. reports generated in response to authorizations and reports generated in response to data transfers are reconciled at a reconciliation node to improve the accuracy of payments collected and paid for use of the data. Such payments include copyright royalties for audio, video, and other works recorded in digital format.
|
6. A reconciling node for managing access to a digital work, the reconciling node comprising:
means for receiving via a provided network a plurality of first reports, each first report being provided in response to a respective transaction that provided the digital work from a content providing node to a content requesting node, each first report comprising a respective transaction identifier and a respective first tracking value, the transaction conducted in response to a request originated by the content requesting node;
means for receiving via the network a plurality of second reports, each second report originating from a content managing node in response to supplying by the content managing node information to validate the request, each second report comprising a respective value, a respective payee identifier, and a respective second tracking value;
means for identifying a particular first report and a particular second report, wherein the particular reports have corresponding tracking values;
means for comparing the respective transaction identifier of the particular first report and the respective value of the particular second report;
means for transmitting onto the network a message enabling payment in accordance with the comparison;
means for receiving via the network a plurality of third reports, each third report comprising indicia of a respective debit in accordance with a respective transaction; and
means for detecting the occurrence of an invalid transaction wherein for the invalid transaction, at least one of the first report, the second report, and the third report are not timely received.
7. A reconciling node for managing access to a digital work, the reconciling node comprising:
means for receiving via a provided network a plurality of first reports, each first report being provided in response to a respective transaction that provided the digital work from a content providing node to a content requesting node, each first report comprising a respective transaction identifier and a respective first tracking value, the transaction conducted in response to a request originated by the content requesting node;
means for receiving via the network a plurality of second reports, each second report originating from a content managing node in response to supplying by the content managing node information to validate the request, each second report comprising a respective value, a respective payee identifier, and a respective second tracking value;
means for identifying a particular first report and a particular second report, wherein the particular reports have corresponding tracking values;
means for comparing the respective transaction identifier of the particular first report and the respective value of the particular second report;
means for transmitting onto the network a message enabling payment in accordance with the comparison;
means for receiving via the network a plurality of third reports, each third report comprising indicia of a respective debit in accordance with a respective transaction; and
means for detecting the occurrence of an invalid transaction wherein for the invalid transaction, at least one of the first report, the second report, and the third report are not originated in a predetermined sequence.
1. A method for managing access to a digital work, the method for execution by a reconciling node, the method comprising:
receiving at the reconciling node via a network a plurality of first reports, each first report being provided in response to a respective transaction that provided the digital work from a content providing node to a content requesting node, each first report comprising a respective transaction identifier and a respective first tracking value, each transaction being conducted in response to a respective request originated by the content requesting node;
receiving at the reconciling node via the network a plurality of second reports, each second report originating from a content managing node in response to supplying by the content managing node information to validate the respective request, each second report comprising a respective value, a respective payee identifier, and a respective second tracking value;
identifying at the reconciling node a particular first report and a particular second report, wherein the particular reports have corresponding tracking values;
comparing at the reconciling node the respective transaction identifier of the particular first report and the respective value of the particular second report;
transmitting at the reconciling node onto the network a message enabling payment in accordance with the comparison;
receiving via the network a plurality of third reports, each third report comprising indicia of a respective debit in accordance with a respective transaction; and
detecting the occurrence of an invalid transaction wherein for the invalid transaction, at least one of the first report, the second report, and the third report are not timely received.
2. A method for managing access to a digital work, the method for execution by a reconciling node, the method comprising:
receiving at the reconciling node via a network a plurality of first reports, each first report being provided in response to a respective transaction that provided the digital work from a content providing node to a content requesting node, each first report comprising a respective transaction identifier and a respective first tracking value, each transaction being conducted in response to a respective request originated by the content requesting node;
receiving at the reconciling node via the network a plurality of second reports, each second report originating from a content managing node in response to supplying by the content managing node information to validate the respective request, each second report comprising a respective value, a respective payee identifier, and a respective second tracking value;
identifying at the reconciling node a particular first report and a particular second report, wherein the particular reports have corresponding tracking values;
comparing at the reconciling node the respective transaction identifier of the particular first report and the respective value of the particular second report;
transmitting at the reconciling node onto the network a message enabling payment in accordance with the comparison;
receiving via the network a plurality of third reports, each third report comprising indicia of a respective debit in accordance with a respective transaction; and
detecting the occurrence of an invalid transaction wherein for the invalid transaction, at least one of the first report, the second report, and the third report are not originated in a predetermined sequence.
4. A method for managing access to a digital work, the method for execution by a reconciling node, the method comprising:
receiving via a network a plurality of first reports, each first report being provided in response to a respective transaction that provided the digital work from a content providing node to a content requesting node, each first report comprising a respective transaction identifier and a respective first tracking value;
receiving via the network a plurality of second reports, each second report originating from a content managing node, each second report comprising a respective value, a respective payee identifier, and a respective second tracking value;
identifying a particular first report and a particular second report, wherein the particular reports have corresponding tracking values;
comparing the respective transaction identifier of the particular first report and the respective value of the particular second report;
transmitting onto the network a message enabling payment in accordance with the comparison;
receiving via the network a plurality of third reports, each third report comprising indicia of a respective debit in accordance with a respective transaction; and
detecting the occurrence of an invalid transaction wherein for the invalid transaction, at least one of the first report, the second report, and the third report are not timely received, wherein:
the plurality of third reports is provided by a plurality of event reporting nodes;
each third report comprises indicia of time of day determined by a respective event reporting node; and
the method further comprises transmitting a second message via the network from which each event reporting node can adjust its time of day for eliminating error in sequence detection.
5. A method for managing access to a digital work, the method for execution by a reconciling node, the method comprising:
receiving via a network a plurality of first reports, each first report being provided in response to a respective transaction that provided the digital work from a content providing node to a content requesting node, each first report comprising a respective transaction identifier and a respective first tracking value;
receiving via the network a plurality of second reports, each second report originating from a content managing node, each second report comprising a respective value, a respective payee identifier, and a respective second tracking value;
identifying a particular first report and a particular second report, wherein the particular reports have corresponding tracking values;
comparing the respective transaction identifier of the particular first report and the respective value of the particular second report;
transmitting onto the network a message enabling payment in accordance with the comparison;
receiving via the network a plurality of third reports, each third report comprising indicia of a respective debit in accordance with a respective transaction; and
detecting the occurrence of an invalid transaction wherein for the invalid transaction, at least one of the first report, the second report, and the third report are not originated in a predetermined sequence, wherein:
the plurality of third reports is provided by a plurality of event reporting nodes;
each third report comprises indicia of time of day determined by a respective event reporting node; and
the method further comprises transmitting a second message via the network from which each event reporting node can adjust its time of day for eliminating error in sequence detection.
9. A reconciling node for managing access to a digital work, the reconciling node comprising:
means for receiving via a provided network a plurality of first reports, each first report being provided in response to a respective transaction that provided the digital work from a content providing node to a content requesting node, each first report comprising a respective transaction identifier and a respective first tracking value;
means for receiving via the network a plurality of second reports, each second report originating from a content managing node, each second report comprising a respective value, a respective payee identifier, and a respective second tracking value;
means for identifying a particular first report and a particular second report, wherein the particular reports have corresponding tracking values;
means for comparing the respective transaction identifier of the particular first report and the respective value of the particular second report;
means for transmitting onto the network a message enabling payment in accordance with the comparison;
means for receiving via the network a plurality of third reports, each third report comprising indicia of a respective debit in accordance with a respective transaction; and
means for detecting the occurrence of an invalid transaction wherein for the invalid transaction, at least one of the first report, the second report, and the third report are not timely received, wherein:
(1) the plurality of third reports is provided by a plurality of event reporting nodes;
(2) each third report comprises indicia of time of day determined by a respective event reporting node; and
(3) the reconciling node further comprises means for transmitting a second message via the network from which each event reporting node can adjust its time of day for eliminating error in sequence detection.
10. A reconciling node for managing access to a digital work, the reconciling node comprising:
means for receiving via a provided network a plurality of first reports, each first report being provided in response to a respective transaction that provided the digital work from a content providing node to a content requesting node, each first report comprising a respective transaction identifier and a respective first tracking value;
means for receiving via the network a plurality of second reports, each second report originating from a content managing node, each second report comprising a respective value, a respective payee identifier, and a respective second tracking value;
means for identifying a particular first report and a particular second report, wherein the particular reports have corresponding tracking values;
means for comparing the respective transaction identifier of the particular first report and the respective value of the particular second report;
means for transmitting onto the network a message enabling payment in accordance with the comparison;
means for receiving via the network a plurality of third reports, each third report comprising indicia of a respective debit in accordance with a respective transaction; and
means for detecting the occurrence of an invalid transaction wherein for the invalid transaction, at least one of the first report, the second report, and the third report are not originated in a predetermined sequence, wherein:
(1) the plurality of third reports is provided by a plurality of event reporting nodes;
(2) each third report comprises indicia of time of day determined by a respective event reporting node; and
(3) the reconciling node further comprises means for transmitting a second message via the network from which each event reporting node can adjust its time of day for eliminating error in sequence detection.
3. The method of
the plurality of third reports is provided by a plurality of event reporting nodes;
each third report comprises indicia of time of day determined by a respective event reporting node; and
the method further comprises transmitting a second message via the network from which each event reporting node can adjust its time of day for eliminating error in sequence detection.
8. The reconciling node of
the plurality of third reports is provided by a plurality of event reporting nodes;
each third report comprises indicia of time of day determined by a respective event reporting node; and
the reconciling node further comprises means for transmitting a second message via the network from which each event reporting node can adjust its time of day for eliminating error in sequence detection.
|
This application is a divisional of and claims priority to U.S. patent application Ser. No. 09/757,951, filed Jan. 10, 2001 now U.S. Pat. No. 6,999,946, which is a divisional of U.S. patent application Ser. No. 09/717,614, filed Nov. 21, 2000 by Nuttall now U.S. Pat. No. 6,889,206, which is a divisional of U.S. patent application Ser. No. 09/055,068, filed Apr. 3, 1998 by Nuttall, now U.S. Pat. No. 6,202,056.
The present invention relates to computer networks for data transfer and to monitoring use of such data for example for fee accounting for usage rights.
Publishers of information in digital form desire to prevent the unauthorized and unaccounted distribution or usage of electronically published materials. Electronically published materials are typically distributed in a digital form and recreated on a computer based system. Audio and video recordings, computer programs, books, and multimedia are examples of works that are suitable for publishing electronically. The sales revenue for companies in the electronic publishing and information systems industries includes payments based on an accounting for delivery of information in digital form, for example the sale of an audio CD at a retail outlet. Any unaccounted distribution of a work results in decreased revenue to the distributor and decreased royalty for the owner of usage rights in the work. For example, being able to copy an audio recording CD to another digital medium from which the audio can be retrieved and played circumvents payment for distribution from which royalty for copyright may have been due to the owner of rights in the work.
Owners of rights in electronically published works also desire to prevent the unauthorized and unaccounted distribution or usage of such materials. When records of the distribution and usage of a work are held exclusively by the distributor, falsification of records results in increased profit for the distributor and loss of royalty income for the owner of rights.
Unauthorized and unaccounted distribution can be curbed by preventing unauthorized copying of the work onto digital storage media and unauthorized transmission of the work over computer networks. Unauthorized and unaccounted usage can be curbed by preventing storage of the work for reuse or by monitoring the use of stored copies.
Existing systems and methods for preventing storage, transmission, and unmonitored use of digital works place a heavy burden of cost on the consumer desiring access to a work in digital form. The continued expansion of publication and use of works in digital form cannot remain within the policies for intellectual property protection (such as providing incentives to authors and publishers) without systems and methods for computer network operation that provide an accurate basis for usage fees.
A system for the control of distribution and use of digital works includes a distribution and usage reporting mechanism for accurately calculating fees associated with such distribution and use. The system operates according to a method for transferring data from a content providing node to a content requesting node. The method includes the steps of: (a) transmitting a first request to the content providing node, the first request for notifying an authorizing node; (b) receiving a permit from the authorizing node in response to the notification; (c) determining a file name in response to the permit; (d) transmitting to the content providing node a second request comprising the file name; (e) transmitting to an event reporting node a first report in response to receiving the permit; (f) receiving data from the file; and (g) transmitting to the event reporting node a second report in response to receiving the file.
By obtaining the permit without direct communication between the content requesting node and the authorizing node, manipulation of the authorizing node by the content requesting node is prevented. The content requesting node has an incentive to manipulate the authorizing node in order to receive unlimited authorization. The content providing node has an incentive to maintain proper authorization because revenues to the content providing node may be based on the number of authorized transfers.
Although a work may be identified in the request received at the content providing node, the content providing node may be prevented from obtaining information leading to the filenames that comprise the work. The content providing node may have an incentive to provide free transfers of the work for other commercial or personal use; however, by determining the file name in response to the permit and preventing access to the permit from the content providing node, the content providing node cannot identify particular files that correspond to a particular work.
By transmitting reports from the content requesting node to an event reporting node, modification of data transfer reports by the content providing node is prevented. Accurate records provide basis, for example, for fees payable to owners of rights in the work.
By transmitting a first report prior to data transfer and a second report after data transfer, a duration of the usage of the data may be used as a basis, for example, for revenues to distributors and payments to owners of rights. Falsification of the duration of usage by the content requesting node is prevented.
Data transfer in the present invention is illustrated among computer systems using a communication network. A communication network of the present invention includes at least one computer system at each of several network nodes. Each node is coupled by a link from time to time for communication with other nodes of the network. Each link includes conventional computer communication technology of the type including, for example, local area, wide area, dedicated telephone, or satellite services and including conventional data communication hardware and software. The popular computer networks known as the Internet, World Wide Web, and National Information Infrastructure are examples of such a communication network having nodes possibly at physically separate locations and addressed by a node address, for example a uniform resource locator (URL), a name from a domain name system (DNS), or an Internet Protocol address (IP).
Communication network 100 of
Communication technology provides known mechanisms and computer software for message transfer. This technology surrounds the message content data with other data that provide a mechanism for various purposes including tracking messages, synchronizing equipment, and assuring accurate and secure transfer of message content data. In the description that follows, digital works are transferred between nodes. The term “content,” therefore, refers to a digital work or a portion thereof.
Network 100 includes content acquisition node 102, content managing node 104, provider preparation node 106, content providing node 108, content requesting node 110, authorizing node 112, banking node 114, event reporting node 116, and reconciling node 118.
In operation, for content to be transferred on request to any of perhaps millions of content requesting nodes, the content is first received from a source and formatted for storage on one or more of perhaps thousands of content providing nodes. Initially, a content developer, publisher, or distributor provides digital works, for example multimedia files, to content acquisition node 102 for encoding in a format efficient for storage and access by content managing node 104. Content is conveyed on line 130 as it becomes available for management by content managing node 104. Content from content managing node 104 is conveyed on line 132 and then made unique to each content providing node 108 by formatting processes performed by provider preparation node 106. Content providing node 108 receives content from time to time from provider preparation node 106 on line 134.
To request a data transfer in a preferred embodiment for the Internet, a user or consumer at content requesting node 110 uses a network browser, such as Microsoft Internet Explorer, and follows an Internet link (clicks on a portion of an HTML file display), causing a message in HTTP format to be conveyed on line 136 to content providing node 108. Content providing node 108 forwards the request on line 138 to authorizing node 112. If the request is valid, authorizing node 112 creates a permit and sends it on line 146 to content requesting node 110. A permit is a message created to uniquely respond to the request from a particular content requesting node. Using portions of the permit, content requesting node 110 requests on line 136 particular files from content providing node 108. In response, such particular files are conveyed on line 148 to content requesting node 110, completing the data transfer.
Accounting for the above described transfer of content includes, for example, receiving payment from the user of content requesting node 110, making payment for distribution services to at least the operator of content providing node 108, and making payment to one or more owners of rights in the content. These accounting transactions find accurate basis in a reconciliation of reports from a variety of network nodes that are reported at separate times during the data transfer process. For example, when authorizing node 112 receives the request and queries an access authority data base on content managing node 104 via lines 140 and 142, content managing node 104 logs the query and reports the log on line 156 from time to time to reconciling node 118. With knowledge of the identity of content requesting node 110, an identity of the user, and a price of the requested work for a requested purpose (for example, copy or preview), authorizing node confirms a debit of an account kept on banking node 114 by messages conveyed on line 144. Banking node 114 logs the debit and reports the log on line 154 from time to time to reconciling node 118. When the data transfer begins and again when at least some of the data has been transferred, content requesting node 110 reports on line 150 to event reporting node 116. Event reporting node 116 logs the events and from time to time reports the log on line 152 to reconciling node 118. By comparing reports received on lines 152, 154, 156, and possibly 158 (from content providing node 108), reconciling node 118 distinguishes valid complete data transfers from incomplete transfers and from events that could indicate intentional interference with the integrity of network 100. For each valid complete transfer, reconciling node 118 allocates revenues generated from the debits of users′ accounts, discussed above with reference to line 144. Reconciling node 118 then initiates funds transfers with messages to banking node 114 on line 160 for payments of, for example, distribution fees and royalties.
Each node of network 100 may represent more than one conventional computer system that performs, inter alia, methods of the present invention. Multiple computers or multiple data storage devices may be necessary for maintaining a particular node's functions operational in periods of high network traffic. Such multiple computers may be at various physical locations, provided that only one network node address (for example, an IP address) is associated with each node.
A method of the present invention for preparing content for storage on a content providing node includes separation of content and map information. When content is divided for convenience into several files in a conventional file storage system, map information identifies the particular files from the entire inventory on the storage system and the order of presentation of the files for reconstituting a particular work. Separation of content and map information facilitates security measures without unduly compromising rapid provision of a work or performance of a work on a content requesting node.
For example, as shown in
When a particular content providing node 108 is identified, works to be provided by that node are selected from content masters store 210 and scrambled by process 214 (using conventional data security technology). Scrambling is a preferred (though weak) form of encryption that allows some security without unduly burdening data transfer or use of the work when requested. The scrambled result of a work is combined with a header, which includes encrypted data from access authority data base 208, to form one or more content files. Content files 217 are transferred for storage on store 216 of content providing node 108.
Process 212 prepares map files 218 for transfer and storage on store 216. Descriptors of the work, of the content files, and of content providing node 108 are obtained from AADB 208 and formatted and encrypted by process 212 (using conventional data formatting and encryption technology). Some or all of the descriptors, alone or in combination, may be subject to rigorous encryption. The map file permits content file locations to be random or at least unpredictable in store 216, substantially decreasing the likelihood of unauthorized access without the system performance penalties associated with encrypting content files 218 on store 216.
In a preferred embodiment for an audio recording, the map file includes a version number of a group of content files and a node address and pathname to each content file of the group. The node address corresponds to the unique node address of the content providing node for which content files are being prepared. Each node address and pathname is encrypted separately. Each content file of the group provides a different level of sound quality for the same audio material. Different levels of quality provide, for example, flexibility in meeting the audio fidelity of different content requesting nodes.
Content files 217 and map files 218 are organized for convenient access on store 216 using a conventional file system such as a directory system, shadowed physical drives, or a RAID system.
As indicated by ellipsis in
Various methods of the present invention for data transfer use to advantage (a) the cooperation of several network nodes, (b) linking a request through a registered node, (c) creating a permit using data from multiple sources, (d) using encryption, current time of day, or encryption keys based on unique properties of a node, and/or (e) providing unique structures and separate access to content files and map files. These features, inter alia, accomplish validating the request, validating the permit, and validating the data transfer operation itself. When validation is unsuccessful, data transfer is stopped, preserving the integrity of network 100. The integrity of network 100 may be compromised by unauthorized copying, transfer, or use of a digital work.
For example, as shown in
Process 308 validates the request by denying further processing to requests that do not meet predetermined criteria. In one variation, shown in
Process 310 (using conventional data base and communication technology) validates payment by the user by confirming that the user (via pay price process 310) has made a proper debit on the user's account. If a debit cannot be confirmed, request 305 is ignored. If confirmation of the debit transaction is successful, control passes to process 312.
Process 312 creates a permit by combining information from more than one source. In one variation, shown in
Process 314 validates the permit by stopping the transaction for permits that do not meet predetermined criteria. In one variation, shown in
Process 316 reports the start of a data transfer between content providing node 108 and content requesting node 110. Generation of the report may occur before data transfer actually starts or during an initial phase of data transfer. A start report is made to one or more event reporting nodes as specified by a list on content providing node 108. The report is transmitted by packet message techniques on a separate port so as to avoid interference with the data transfer itself which may be underway on another port. The two ports may share the same communication hardware such as a single line to an Internet Service Provider, as is well known in applications of TCP/IP. For other communication hardware and software configurations, concurrent ports may be arranged on two or more hardware communication links.
In one variation, shown in
Process 320 obtains and uses the requested content files. After a content file header has been received by process 320, the transaction may be stopped if contents of the header do not compare favorably with the permit. In one variation, a summary report is prepared before data transfer of all requested files is complete. Further requests for files may be made in response to receiving an acknowledgement that the summary report has been received by the event reporting node. In a second variation, a duration of use of the files is measured and reported in a summary report, prepared and sent after all files have been received or usage is determined to be substantially completed. In the later case, shown in
At step 1012, the usage mode as permitted is compared to the usage mode as requested. The user specifies a usage mode at the time of picking a title for a digital work to facilitate calculation of an appropriate price. For example, in many cases, the price for previewing a work (as in listening to a portion of an audio work) is less than the price for making a copy of a work for unlimited use. If the requested and permitted usage modes both indicate a copy is to be made, that is, the data transferred will be stored for repeated use, then control passes to step 1202 on
At step 1110, information from several sources is combined to form a summary report. One purpose of the summary report is to indicate for purposes of reconciliation, the duration the digital work was being performed.
If at step 1012, a copy of the work has been permitted, control passes to step 1202. At step 1202, a destination file for receiving the digital work is opened on the content requesting node 110. At step 1204, an encryption key is prepared using conventional data security technology. At step 1206, the content file header is obtained and written to the destination file. At steps 1208 through 1214, each block of the requested content file is obtained, encrypted, and written to the destination file. At step 1216, the destination file is closed. At step 1218 the transaction is completed.
From time to time, reports are generated by various nodes for checking the integrity of network 100 and for allocating revenues received by debiting user accounts as described with reference to
Each report consists of multiple records, each record having multiple fields. Because these reports have some fields in common, comparison of the data in identical fields (“reconciliation”) provides the basis for distinguishing valid complete transactions from interrupted and unauthorized transactions. For example, an access report record 1900, debit report record 2000, start report 1700, and summary report 1800 each include a tracking field for the value: request.CRN.node.address.transaction.number. By noting whether all four records having the same value for this tracking field have been received at reconciling node 118, conclusions about network integrity and allocation of funds can be reliably made.
A method for reconciling reports of the present invention includes accommodations for high volume event report processing. In addition, reconciled reports may be used to identify nodes having suspect operations and thereby provide a way of detecting unauthorized copying and use of digital works.
In combination with the operation of the AADB 208, unauthorized use may be blocked. For example, if unauthorized transactions frequently involve the same content providing node address, that node address may be deleted from the list of registered content providing nodes by an appropriate operation on AADB 208. When a content requesting node makes a request through the link at the offending content providing node address, the request will be denied at the authorizing node. An example of a reconciliation method of the present invention is illustrated in
From time to time records from events data base 404 are provided to reconciling node 118. Process 406, using conventional data base technology, accomplishes the comparison of records having one or more respective field values that are identical. In one variation, the tracking field is used exclusively. Table 502 in
If on the other hand, one or more of the expected reports is not timely received for reconciliation having the given common field values, then it can be suspected that software on one or more nodes of network 100 may have been manipulated, compromising network integrity. Due to the large number of content requesting nodes and the lack of physical controls that could protect software on such nodes from being manipulated, it is likely that at least some of the failures to receive all expected reports may be a consequence of content requesting node software manipulation. In cases 508 and 510, some or all requested data transfer might have been successful; however, allocation of earnings may not be justified when there remains a possibility that a user of the respective content requesting node may insist that the debit to his account be reversed.
Allocation of earnings by process 408 is consummated by generating, according to conventional banking messaging and data base technology, requests for finds transfer by process 410 in banking node 114.
As described in detail above, network 100 overcomes the problems of the prior art and provides a basis for accurate allocation of earnings to the owners of rights in digital works stored on systems of the present invention or transferred according to methods of the present invention. These and other benefits are provided with lesser system performance penalties than heretofore possible.
The present invention has been described in the preferred embodiments. Several variations and modification shave also been described and suggested. Other embodiments, variations, and modifications known to those skilled in the art may be implemented without departing from the scope and spirit of the invention as recited in the claims below.
Patent | Priority | Assignee | Title |
7454648, | Sep 09 2005 | International Business Machines Corporation | System and method for calibrating a time of day clock in a computing system node provided in a multi-node network |
8132038, | Sep 09 2005 | International Business Machines Corporation | System and method for calibrating a time of day (TOD) clock in a computing system node provided in a multi-node network |
Patent | Priority | Assignee | Title |
4658093, | Jul 11 1983 | ALADDIN KNOWLEDGE SYSTEMS, INC | Software distribution system |
5050213, | Oct 14 1986 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
5138712, | Oct 02 1989 | SUN MICROSYSTEMS, INC , A CORP OF DE | Apparatus and method for licensing software on a network of computers |
5291596, | Oct 10 1990 | Fuji Xerox Co., Ltd. | Data management method and system with management table indicating right of use |
5337357, | Jun 17 1993 | SAFENET, INC | Method of software distribution protection |
5455953, | Nov 03 1993 | RAKUTEN, INC | Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket |
5563946, | Apr 25 1994 | ACTIVISION PUBLISHING, INC | Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems |
5592511, | May 10 1994 | MANTA MUSIC, LLC | Digital customized audio products with user created data and associated distribution and production system |
5629980, | Nov 23 1994 | CONTENTGUARD HOLDINGS, INC | System for controlling the distribution and use of digital works |
5634012, | Nov 23 1994 | CONTENTGUARD HOLDINGS, INC | System for controlling the distribution and use of digital works having a fee reporting mechanism |
5715403, | Nov 23 1994 | CONTENTGUARD HOLDINGS, INC | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
5737414, | May 24 1995 | Qualcomm Incorporated | 900 number billing and collection system and method for on-line computer services |
5758068, | Sep 19 1995 | International Business Machines Corporation | Method and apparatus for software license management |
5765152, | Oct 13 1995 | DIGIMARC CORPORATION AN OREGON CORPORATION | System and method for managing copyrighted electronic media |
5783808, | Jan 11 1996 | Carreker Corporation | Electronic check presentment system having transaction level reconciliation capability |
5790423, | Jun 14 1995 | Audible, Inc | Interactive audio transmission receiving and playback system |
5870562, | Mar 24 1997 | Cisco Technology, Inc | Universal domain routing and publication control system |
5892900, | Aug 30 1996 | INTERTRUST TECHNOLOGIES CORP | Systems and methods for secure transaction management and electronic rights protection |
5893128, | Mar 01 1993 | VAN-KA B V | Distributed work flow management |
5907617, | Jun 07 1995 | Digital River, Inc. | Try before you buy software distribution and marketing system |
5910987, | Feb 13 1995 | INTERTRUST TECHNOLOGIES CORP | Systems and methods for secure transaction management and electronic rights protection |
5930768, | Feb 06 1996 | SUPERSONIC BOOM, INC | Method and system for remote user controlled manufacturing |
5937164, | Nov 25 1996 | Apple Inc | Method and apparatus of secure server control of local media via a trigger through a network for instant local access of encrypted data on local media within a platform independent networking system |
6088455, | Jan 07 1997 | TIVO SOLUTIONS INC | Methods and apparatus for selectively reproducing segments of broadcast programming |
6201771, | Jun 24 1998 | Sony Corporation | Content providing system |
6202056, | Apr 03 1998 | Rovi Solutions Corporation | Method for computer network operation providing basis for usage fees |
6232539, | Jun 17 1998 | MOAEC TECHNOLOGIES LLC | Music organizer and entertainment center |
6236971, | Nov 23 1994 | CONTENTGUARD HOLDINGS, INC | System for controlling the distribution and use of digital works using digital tickets |
6249865, | May 24 1995 | Qualcomm Incorporated | Systems and methods for a user to access digital data provided by an on-line server over a data network |
6253069, | Jun 22 1992 | INTELLECTUAL VENTURES AUDIO INNOVATIONS LLC | Methods and apparatus for providing information in response to telephonic requests |
6253193, | Feb 13 1995 | Intertrust Technologies Corporation | Systems and methods for the secure transaction management and electronic rights protection |
6484203, | Nov 09 1998 | SRI INTERNATIONAL, INC | Hierarchical event monitoring and analysis |
6571285, | Dec 23 1999 | Accenture Global Services Limited | Providing an integrated service assurance environment for a network |
20060107330, | |||
JP200331528, | |||
WO9737492, | |||
WO9809209, | |||
WO9810381, |
Date | Maintenance Fee Events |
Feb 10 2011 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Feb 18 2015 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Apr 22 2019 | REM: Maintenance Fee Reminder Mailed. |
May 16 2019 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
May 16 2019 | M1556: 11.5 yr surcharge- late pmt w/in 6 mo, Large Entity. |
Date | Maintenance Schedule |
Sep 04 2010 | 4 years fee payment window open |
Mar 04 2011 | 6 months grace period start (w surcharge) |
Sep 04 2011 | patent expiry (for year 4) |
Sep 04 2013 | 2 years to revive unintentionally abandoned end. (for year 4) |
Sep 04 2014 | 8 years fee payment window open |
Mar 04 2015 | 6 months grace period start (w surcharge) |
Sep 04 2015 | patent expiry (for year 8) |
Sep 04 2017 | 2 years to revive unintentionally abandoned end. (for year 8) |
Sep 04 2018 | 12 years fee payment window open |
Mar 04 2019 | 6 months grace period start (w surcharge) |
Sep 04 2019 | patent expiry (for year 12) |
Sep 04 2021 | 2 years to revive unintentionally abandoned end. (for year 12) |